WO2008068078A1 - Remote controller having an rfid tag - Google Patents
Remote controller having an rfid tag Download PDFInfo
- Publication number
- WO2008068078A1 WO2008068078A1 PCT/EP2007/060319 EP2007060319W WO2008068078A1 WO 2008068078 A1 WO2008068078 A1 WO 2008068078A1 EP 2007060319 W EP2007060319 W EP 2007060319W WO 2008068078 A1 WO2008068078 A1 WO 2008068078A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- remote control
- control device
- distant equipment
- rfid tag
- user
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C17/00—Arrangements for transmitting signals characterised by the use of a wireless electrical link
- G08C17/02—Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/4104—Peripherals receiving signals from specially adapted client devices
- H04N21/4126—The peripheral being portable, e.g. PDAs or mobile phones
- H04N21/41265—The peripheral being portable, e.g. PDAs or mobile phones having a remote control device for bidirectional communication between the remote control device and client device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/422—Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS]
- H04N21/42204—User interfaces specially adapted for controlling a client device through a remote control device; Remote control devices therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/422—Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS]
- H04N21/42204—User interfaces specially adapted for controlling a client device through a remote control device; Remote control devices therefor
- H04N21/42206—User interfaces specially adapted for controlling a client device through a remote control device; Remote control devices therefor characterized by hardware details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/422—Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS]
- H04N21/42204—User interfaces specially adapted for controlling a client device through a remote control device; Remote control devices therefor
- H04N21/42206—User interfaces specially adapted for controlling a client device through a remote control device; Remote control devices therefor characterized by hardware details
- H04N21/42221—Transmission circuitry, e.g. infrared [IR] or radio frequency [RF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/441—Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/436—Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
- H04N21/4367—Establishing a secure communication between the client and a peripheral device or smart card
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/4508—Management of client data or end-user data
- H04N21/4532—Management of client data or end-user data involving end-user characteristics, e.g. viewer profile, preferences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/475—End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data
- H04N21/4751—End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data for defining user accounts, e.g. accounts for children
Definitions
- the present invention is in the field of remote controllers and more particularly relates to a remote controller using Radio Frequency IDentification technology.
- the remote controllers send data messages to the distant electronic equipment to initiate actions.
- the remote controllers need an additional battery or an equivalent power device to sufficiently power the electronic components, the processors, the InfraRed diodes and/or the High Frequency partitions.
- the existing remote controllers are suitable to respond to a large range of applications, the necessity to include a battery to power the electronic elements is a major inconvenient which among other drawbacks limit the size of those remote controllers. Moreover, the existing remote controllers do not offer the possibility to be individually customized in order to restrict its usage to one person.
- the present invention offers a solution to solve the aforementioned problems.
- RFID Radio Frequency IDentification
- the basic concept of Radio Frequency IDentification consists in identifying and tracking devices mainly for system management purposes, using devices called RFID tags or transponders.
- the RFID tag picks up signals from and sends signals to a reader machine.
- the tag contains a unique serial number that identifies the device handling it but may have additional information, such as for example a customers' account number.
- Tags may come in many forms, such as smart labels that can have a barcode printed on it.
- RFID tags can be active, passive or semi-passive. Beyond the common application of tracking, RFID also suits for high technology wireless electronic systems based on message identification.
- Those wireless systems allow a readable machine to pick up messages stored on the tag device.
- the readable machine reads the notification message, identifies the device and then a preferred action which is indicated in the stored message is initiated. Bursts of electromagnetic waves are sent to the distant device located in a limited vicinity in order to power the RFID component.
- the RFID device replies to the incoming signals by providing the necessary information about its identity.
- the readable machine operates like a remote controller of a mobile device on which is attached a RFID tag.
- this normal mode is reversed in the invention, which reverse mode was not obvious to determine for implementation in a remote controller.
- the Programmable Secure Remote Controller allows transmission of a user' s selection after a decision-making identification process is performed.
- the decision-making identification program consist in a large variety of predefined dinosaurri to deal successfully with the various equipments that need to be controlled.
- the predefined dinosaurri are set up during the chip design configuration and depend on application domain where the remote controller is to be used. Moreover, for security purposes, the strigri may be encrypted into an identification memory.
- the identification memory that interacts with a RFID tag device may be a non-volatile memory such as a Read Only Memory or a Flash Memory (which can be easily updated in case of necessity) .
- a sensitive board included in the remote controller allows the user selection of the desired predefined scenario.
- the sensitive board contains a matrix of functional key strokes allowing a user to select an action by hitting the adequate button (s).
- the remote controller associates one dedicated action to one button selection or to one sequence of buttons selection, and a predefined scenario stored in the internal memory of the remote controller is operated.
- the remote controller of the present invention is based on the RFID technology.
- the RFID tags of the present inventions are included in the remote controller while the electromagnetic beam transmitter is included in the equipment that needs to be managed.
- Such reverse mode allows the remote controller to be energy-less in regards to the usual RFID devices.
- such arrangement offers the real advantage of a reduced implementation on small card format like credit card and thus a real cost manufacturing reduction.
- the present invention may be adapted to cash machines.
- a user may directly enter his pin code on the credit card without inserting the credit card in any device and then the card transaction may be granted in a secure and confidential mode.
- a remote controller as defined in the appended independent claim 1
- a program storage device as defined in the appended independent claim 11
- a method as defined in the appended claim 11.
- Figure 1 shows a block diagram of a preferred implementation of the present invention
- Figure 2 details the logical operations to manage the data transfer initiated by the remote controller
- Figure 3 illustrates a user selection process
- a "Programmable Secure Remote Controller -PSRC-" based on RFID technology is provided.
- the transmission of a user's action selection is performed using a compact energy-less and contact-less mechanism associated to a decision-making identification process.
- the present invention may be used in various industrial and/or banking areas.
- the PSRC contains one or more RFID tag devices depending on the functions implemented within the remote controller.
- the RFID tag device receives the electromagnetic beam from the transmitter that is integrated in the equipment that needs to be controlled.
- the disclosed RFID system is fully compliant with the EPCglobal Network convention and application guidelines that use the "ISO15693", the "ISO18000” and the anti-collision protocols.
- the EPCglobal Network provides the conventions about the EPC (Electronic Product Code) arrangement, the ID System (EPC tags and Reader) , the Object Name Services (ONS), the Physical Markup Language (PML) and finally the Savant that represents the engine of the data management based on software technology.
- FIG. 1 a general block diagram of the present system (100) is shown having two main components, a "Programmable Secure Remote Controller” -PSRC- (102) and a distant equipment (104) to be operated. Once powered, via a "Programmable Secure Remote Controller" -PSRC- (102) and a distant equipment (104) to be operated. Once powered, via a "Programmable Secure Remote Controller" -PSRC- (102) and a distant equipment (104) to be operated. Once powered, via a
- the distant equipment (104) transmits an electromagnetic beam (106) to drive an antenna (108) located on the PSRC that is located within a limited radius (represented by circle arch) .
- the electromagnetic beam (106) to drive an antenna (108) located on the PSRC that is located within a limited radius (represented by circle arch) .
- a decision-making identification circuit (114) coupled to the Reflecting Logic initiates one or several built-in encrypted predefined dinosaurri
- the remote controller further includes a matrix of push buttons (118) to enable the user to enter the appropriate selection to operate the remote equipment. Going now to figure 2, a logical diagram of the operations processed at the PSRC (200) are described.
- the process starts when an energy flow (issued from the RFID tag) initiates a Request (202) that needs to be granted by the Reflecting Logic.
- the Reflecting Logic represents the RFID tag identity that needs to be detected and identified by the distant equipment.
- the tag identification is conformed to the Electronic Product Code (EPC Global) standard.
- the tag identity is generally the concatenation of several fields that provide the content of a message header (Version 8 bits) , the EPC Manager (Manufacturer 28 bits), the Object Class (Product 24 bits) and the Serial Number (Serial Number 24 bits) .
- the Decision-Making Identification function (218) identifies the user by validating a password code via a Password Code Validation block function (208).
- the password code is typed via a Matrix Buttons (204) located on a Sensitive Board (206) .
- the user is then identified as being authorized via an Identified Password code block function (210).
- the combination of the Identified Password code block function with the 24 bits Electronic Product Code -EPC- (212) (EPC usually provides unique key and content for a tag) allows the PSRC to operate in a flexible secure protocol by having the possibility to use multiple user passwords. Such arrangement combines the 24 bits serial number code of the EPC
- PSRC to be handled by various authorized user group or service provider that want to access to the distant equipment.
- the validation of the password and the user identification enables the validation of the requested operation via a Requested Operation Validation block function (216) .
- the Decision-making Identification block (218) generates an Internal Security Key (block 220) to decode the corresponding Predefined Scenari that is encrypted in block 212.
- the predefined strigri are stored in a Memory block (224) .
- the Encrypted Predefined Scenari are encrypted for security reasons and need to be decoded before transmission. According to the user application, several algorithms are stored in the memory.
- the algorithm checks that the desired channel of the TV is authorized to be watched by young people.
- the user can activate various operations by using the Matrix Buttons located on the Sensitive Board without typing his/her password again, such as for example, a TV user desiring to change the current TV channel to another one.
- the Failure Password code block (226) locks and inhibits the PSRC remote controller via a "Locked System till Password reset" block (228) as long as the undesirable situation persists.
- a recovery password reset is necessary to reset the PSRC remote controller. It has to be applied by a security people in charge of restoring the remote controller via the logic chain consisting to blocks 204,206,208 and 210.
- An additional security function is to authorize the massive destruction of the PSRC remote controller, via the RFID tag by using an appropriate electromagnetic beam that would erase the content of a dedicated register.
- the data transfer is initiated from either the PSRC to the distant equipment or the reverse.
- the data packets related to the user' s preferred wireless message are encrypted by using a protected key that is hard coded in the memory (not shown in Figure 2) .
- This key is provided to the distant equipment at the leading data message transfer to protect the global transmission allowing the entire transmission to be locked between the two elements until transfer completion. Transfer completion is indicated to the distant equipment via a dedicated operating code that is stored in the memory (224) .
- This feature allows the wireless communication to be initiated as a robust and secure safeguard protocol, keeping a data coherency of the wireless message all along the transfer.
- an energy flow is detected: During the energy detection phase the passive RFID tag permanently receives the energy contained in the electromagnetic beam transmitted from the distant equipment. The detection of this energy initiates a Reflecting Logic Activation phase (step 302) . On step 302, the power transmitted from the distant equipment energies the Reflecting Logic block. This latter is powered on and initiates a User Password Identification phase (step 303) .
- the User Password Identification phase checks that the user' s password is correct before granting the Requested Operation.
- the user's password is entered using the Matrix Buttons and the password checking procedure is initiated via the User Password Validation phase (step 304).
- step 304 the user's password is checked and validated and the user is identified in order to authorize the Requested Operation to start the data transmission.
- the user's password is compared (step 312) to a password table that was preliminary defined by the PSRC owner during the PSRC configuration phase. The way the password table is coded and how the PSRC configuration phase is established are not described in this document, as being normal configuration operations for remote controllers. If the password is not correct (branch No) , the User Password Failure phase (step 305) is initiated.
- step 305 the failure Password Code is activated and leads the PSRC to be locked until a password reset is applied.
- the Requested Operation then fails and the PSRC is locked (lock procedure 228) .
- the process loops back to step 303.
- step 306 if the password is correct (Branch Yes), then the user password is accepted on step 306.
- the system identifies the user as an authorized person to operate the PSRC and thus the necessary access is given to run the desired Requested Operation.
- step 307 allows to combine the user's password with the Electronic Product Code -EPC- to create a resultant polynomial that is used to generate a signature key based on a Cyclic Redundancy Checks (CRC) concept.
- CRC Cyclic Redundancy Checks
- step 308 the requested operation is granted thereby allowing the data transmission to start.
- a Security Key is generated to allow the corresponding encrypted predefined scenario to be decoded on step 310.
- the Security Key is generated by any well-known key generator that is not described in this document.
- the key is like a polynomial formula that allows the Encrypted Predefined Scenari to be decrypted all along the current data transfer. Both the PSRC and the distant equipment are locked together until the current data transfer is completed thereby avoiding any undesirable parasitic communication issued from another system.
- the present remote controller can offer various features to be used in card service concept, like a portable digital code that allows removing the apparent device near to the door, which can be vandalized or used by hackers.
- the activation of the card can be customized by using a personal password that is different for each others allowing setting different codes to different people as well as setting different code for different doors.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Child & Adolescent Psychology (AREA)
- Selective Calling Equipment (AREA)
Abstract
A remote control device based on RFID technology is disclosed. The remote controller comprise a RFID tag to receive RF signals from a distant equipment and decoding means to determine if the distant equipment is authorized to be controlled by the remote controller. The remote controller further allows to check the identity of the user to activate the remote control.
Description
REMOTE CONTROLLER HAVING AN RFID TAG
Technical Field
The present invention is in the field of remote controllers and more particularly relates to a remote controller using Radio Frequency IDentification technology.
Background of the invention
Nowadays industries use high technology remote controllers, particularly the industries having the need to control distant equipment like robotics, mechatronics, automotive, numeric systems, camera, VCR, sound system or television and any other electronic devices that need specific commands to operate. The remote controllers send data messages to the distant electronic equipment to initiate actions. In order to operate safely and correctly the remote controllers need an additional battery or an equivalent power device to sufficiently power the electronic components, the processors, the InfraRed diodes and/or the High Frequency partitions.
Whereas the existing remote controllers are suitable to respond to a large range of applications, the necessity to include a battery to power the electronic elements is a major inconvenient which among other drawbacks limit the size of those remote controllers.
Moreover, the existing remote controllers do not offer the possibility to be individually customized in order to restrict its usage to one person.
Finally, the existing remote controllers do not offer the possibility to check the identity of a person.
The present invention offers a solution to solve the aforementioned problems.
Summary of the invention
Therefore there is a need for a battery-free remote controller that allows to control electronic equipment.
There is also a need for a secure remote controller which can be programmed to operate different equipments once the identity of the owner is checked.
The above mentioned needs are achieved by the present invention which provides a secure remote control unit based on the RFID technology. The basic concept of Radio Frequency IDentification (RFID) consists in identifying and tracking devices mainly for system management purposes, using devices called RFID tags or transponders. The RFID tag picks up signals from and sends signals to a reader machine. The tag contains a unique serial number that identifies the device handling it but may have additional information, such as for example a customers' account number. Tags may come in many forms, such as smart labels that can have a barcode printed on it. Moreover, RFID tags can be active, passive or semi-passive. Beyond the common application of tracking, RFID also suits for high technology wireless electronic systems based on message identification. Those wireless systems allow a readable machine to pick up messages stored on the tag device. The readable machine reads the notification message,
identifies the device and then a preferred action which is indicated in the stored message is initiated. Bursts of electromagnetic waves are sent to the distant device located in a limited vicinity in order to power the RFID component. The RFID device replies to the incoming signals by providing the necessary information about its identity. In this RFID use, the readable machine operates like a remote controller of a mobile device on which is attached a RFID tag. However, as it will be detailed herein below, this normal mode is reversed in the invention, which reverse mode was not obvious to determine for implementation in a remote controller.
Thus, it is an object of the present invention to provide a compact energy-less programmable apparatus, herein named Programmable Secure Remote Controller (PSRC in short) to operate distant equipments located in a limited vicinity. By using in an innovative manner some of the RFID principles, the Programmable Secure Remote Controller allows transmission of a user' s selection after a decision-making identification process is performed.
The decision-making identification program consist in a large variety of predefined scenari to deal successfully with the various equipments that need to be controlled.
The predefined scenari are set up during the chip design configuration and depend on application domain where the remote controller is to be used. Moreover, for security purposes, the scenari may be encrypted into an identification memory.
The identification memory that interacts with a RFID tag device may be a non-volatile memory such as a Read Only Memory or a Flash Memory (which can be easily updated in case of necessity) .
A sensitive board included in the remote controller allows the user selection of the desired predefined scenario.
The sensitive board contains a matrix of functional key strokes allowing a user to select an action by hitting the adequate button (s).
Before granting a requested selection, several identification routines are run at the Remote Controller side to check the validity of the transaction by identifying the owner. Once identified, the user selects the intended action by hitting the appropriate button or sequence of keys.
The remote controller associates one dedicated action to one button selection or to one sequence of buttons selection, and a predefined scenario stored in the internal memory of the remote controller is operated.
As early mentioned, the remote controller of the present invention is based on the RFID technology. However, contrary to the known use of RFID tags, the RFID tags of the present inventions are included in the remote controller while the electromagnetic beam transmitter is included in the equipment that needs to be managed. Such reverse mode allows the remote controller to be energy-less in regards to the usual RFID devices. Moreover, such arrangement offers the real advantage of a reduced implementation on small card format like credit card and thus a real cost manufacturing reduction.
Several extended applications of the present invention may become apparent while reading the following description. For example, the present invention may be adapted to cash machines. A user may directly enter his pin code on the credit card without inserting the credit card in any device and then the card transaction may be granted in a secure and confidential mode.
According to the present invention there is provided a remote controller as defined in the appended independent claim 1, a program storage device as defined in the appended independent claim 11, and a method as defined in the appended claim 11.
Further embodiments of the invention are provided in the appended dependent claims.
Brief description of the drawings
The above and other items, features and advantages of the invention will be better understood by reading the following more particular description of the invention in conjunction with the accompanying drawings wherein:
Figure 1 shows a block diagram of a preferred implementation of the present invention;
Figure 2 details the logical operations to manage the data transfer initiated by the remote controller;
Figure 3 illustrates a user selection process.
Detailed description of the invention
Going now into details of the present invention, a "Programmable Secure Remote Controller -PSRC- " based on RFID technology is provided. The transmission of a user's action selection is performed using a compact energy-less and contact-less mechanism associated to a decision-making identification process. The present invention may be used in various industrial and/or banking areas.
The PSRC contains one or more RFID tag devices depending on the functions implemented within the remote controller. The
RFID tag device receives the electromagnetic beam from the transmitter that is integrated in the equipment that needs to be controlled.
In a preferred implementation, the disclosed RFID system is fully compliant with the EPCglobal Network convention and application guidelines that use the "ISO15693", the "ISO18000" and the anti-collision protocols. The EPCglobal Network provides the conventions about the EPC (Electronic Product Code) arrangement, the ID System (EPC tags and Reader) , the Object Name Services (ONS), the Physical Markup Language (PML) and finally the Savant that represents the engine of the data management based on software technology.
Even if some solutions can be integrated by using a wide variety of different RFID standards the preferred implementation is based on using passive tags that do not need battery powering. In addition, the data treatment and speed transmission do not require fast-growing data performance to achieve a sufficient read range in a limited radius.
Referring first to Figure 1, a general block diagram of the present system (100) is shown having two main components, a "Programmable Secure Remote Controller" -PSRC- (102) and a distant equipment (104) to be operated. Once powered, via a
Power Supply input (not shown), the distant equipment (104) transmits an electromagnetic beam (106) to drive an antenna (108) located on the PSRC that is located within a limited radius (represented by circle arch) . The electromagnetic beam
(106) powers a passive RFID tag (110), and a resultant energy allows a Reflecting Logic (112) to be sufficiently self-powered for the whole data transfer. A decision-making identification circuit (114) coupled to the Reflecting Logic initiates one or several built-in encrypted predefined scenari
(116) . The remote controller further includes a matrix of push buttons (118) to enable the user to enter the appropriate selection to operate the remote equipment.
Going now to figure 2, a logical diagram of the operations processed at the PSRC (200) are described.
The process starts when an energy flow (issued from the RFID tag) initiates a Request (202) that needs to be granted by the Reflecting Logic. The Reflecting Logic represents the RFID tag identity that needs to be detected and identified by the distant equipment. The tag identification is conformed to the Electronic Product Code (EPC Global) standard. The tag identity is generally the concatenation of several fields that provide the content of a message header (Version 8 bits) , the EPC Manager (Manufacturer 28 bits), the Object Class (Product 24 bits) and the Serial Number (Serial Number 24 bits) . In order to be fully decoded by the distant equipment, the Decision-Making Identification function (218) identifies the user by validating a password code via a Password Code Validation block function (208). The password code is typed via a Matrix Buttons (204) located on a Sensitive Board (206) . The user is then identified as being authorized via an Identified Password code block function (210). The combination of the Identified Password code block function with the 24 bits Electronic Product Code -EPC- (212) (EPC usually provides unique key and content for a tag) allows the PSRC to operate in a flexible secure protocol by having the possibility to use multiple user passwords. Such arrangement combines the 24 bits serial number code of the EPC
(16 million combinations) with a CRC signature key logic (214) and with the Identified Password code (210) . This allows the
PSRC to be handled by various authorized user group or service provider that want to access to the distant equipment. The validation of the password and the user identification enables the validation of the requested operation via a Requested Operation Validation block function (216) .
The Decision-making Identification block (218) generates an Internal Security Key (block 220) to decode the
corresponding Predefined Scenari that is encrypted in block 212. The predefined scenari are stored in a Memory block (224) .
The Encrypted Predefined Scenari are encrypted for security reasons and need to be decoded before transmission. According to the user application, several algorithms are stored in the memory.
For example, when using the PSRC in a TV set application, the algorithm checks that the desired channel of the TV is authorized to be watched by young people.
Other applications may be to use the PSRC to monitor the setting of a coherency VCR recording sequence in terms of date, duration, tape free space and so on...
To summarize, once the Identified Password Code is correct and the Encrypted Predefined Scenari are decoded by the adequate Security Key, then the Requested Operation is granted and the data messages are transferred from the PSRC to the distant equipment.
As far as the Requested Operation is validated the user can activate various operations by using the Matrix Buttons located on the Sensitive Board without typing his/her password again, such as for example, a TV user desiring to change the current TV channel to another one.
If the Password Code Validation block detects individual swindling or unauthorized accessing, like a password failure or an equipment aggression or a system violation , the Failure Password code block (226) locks and inhibits the PSRC remote controller via a "Locked System till Password reset" block (228) as long as the undesirable situation persists.
A recovery password reset is necessary to reset the PSRC remote controller. It has to be applied by a security people
in charge of restoring the remote controller via the logic chain consisting to blocks 204,206,208 and 210.
An additional security function is to authorize the massive destruction of the PSRC remote controller, via the RFID tag by using an appropriate electromagnetic beam that would erase the content of a dedicated register.
Once the RFID wireless communication is established between the two elements, the data transfer is initiated from either the PSRC to the distant equipment or the reverse.
For each data transmission the data packets related to the user' s preferred wireless message are encrypted by using a protected key that is hard coded in the memory (not shown in Figure 2) . This key is provided to the distant equipment at the leading data message transfer to protect the global transmission allowing the entire transmission to be locked between the two elements until transfer completion. Transfer completion is indicated to the distant equipment via a dedicated operating code that is stored in the memory (224) .
This feature allows the wireless communication to be initiated as a robust and secure safeguard protocol, keeping a data coherency of the wireless message all along the transfer.
Referring now to Figure 3, a flow chart of the operation for a data transfer between the PSRC and the distant equipment is detailed.
At a first step (301), an energy flow is detected: During the energy detection phase the passive RFID tag permanently receives the energy contained in the electromagnetic beam transmitted from the distant equipment. The detection of this energy initiates a Reflecting Logic Activation phase (step 302) .
On step 302, the power transmitted from the distant equipment energies the Reflecting Logic block. This latter is powered on and initiates a User Password Identification phase (step 303) .
On step 303, the User Password Identification phase checks that the user' s password is correct before granting the Requested Operation. The user's password is entered using the Matrix Buttons and the password checking procedure is initiated via the User Password Validation phase (step 304).
On step 304, the user's password is checked and validated and the user is identified in order to authorize the Requested Operation to start the data transmission. The user's password is compared (step 312) to a password table that was preliminary defined by the PSRC owner during the PSRC configuration phase. The way the password table is coded and how the PSRC configuration phase is established are not described in this document, as being normal configuration operations for remote controllers. If the password is not correct (branch No) , the User Password Failure phase (step 305) is initiated.
On step 305, the failure Password Code is activated and leads the PSRC to be locked until a password reset is applied. The Requested Operation then fails and the PSRC is locked (lock procedure 228) . The process loops back to step 303.
Going back to step 312, if the password is correct (Branch Yes), then the user password is accepted on step 306. The system identifies the user as an authorized person to operate the PSRC and thus the necessary access is given to run the desired Requested Operation.
Next step 307 allows to combine the user's password with the Electronic Product Code -EPC- to create a resultant polynomial that is used to generate a signature key based on a Cyclic Redundancy Checks (CRC) concept.
Next, on step 308, the requested operation is granted thereby allowing the data transmission to start.
On step 309, a Security Key is generated to allow the corresponding encrypted predefined scenario to be decoded on step 310. The Security Key is generated by any well-known key generator that is not described in this document. The key is like a polynomial formula that allows the Encrypted Predefined Scenari to be decrypted all along the current data transfer. Both the PSRC and the distant equipment are locked together until the current data transfer is completed thereby avoiding any undesirable parasitic communication issued from another system.
It has to be appreciated that while the invention has been particularly shown and described with reference to a preferred embodiment, various changes in form and details may be made therein without departing from the spirit, and scope of the invention, as illustrated in the following alternate embodiments :
The present remote controller can offer various features to be used in card service concept, like a portable digital code that allows removing the apparent device near to the door, which can be vandalized or used by hackers. The activation of the card can be customized by using a personal password that is different for each others allowing setting different codes to different people as well as setting different code for different doors.
Claims
1. A remote control device (102) comprising:
- a short range receiver (108) for receiving RF signals (106) from at least one distant equipment (104); - a RFID tag (110) activated by the received RF signals for generating information indicative of the at least one distant equipment;
- decoding means (112,114) coupled to the RFID tag for identifying the at least one distant equipment through the information received by the RFID tag; and processing means (116,118) coupled to the decoding means for activating a remote control of the at least one distant equipment.
2. The remote control device of claim 1 wherein the decoding means comprise:
- means (112) for determining if the at least one distant equipment is authorized to be controlled by said remote control device.
3. The remote control device of claim 1 or 2 wherein the decoding means further comprise means (114) for identifying a user of the remote control device.
4. The remote control device of claim 3 wherein the identification means comprise password control means.
5. The remote control device of claim 4 further comprises means for inputting a user password.
6. The remote control device of anyone of claims 1 to 5 wherein the processing means comprise means for retrieving a predefined process among a plurality of predefined processes to control the at lest one distant equipment.
7. The remote control device of claim 6 further comprising memory means for storing the plurality of predefined processes .
8. The remote control device of anyone of claims 1 to 7 further comprising means for allowing a user to select a predefined process.
9. The remote control device of anyone of claims 1 to 8 further comprising means for deactivating the remote control device.
10. The remote control device of anyone of claims 1 to 9 wherein the RFID tag is a passive tag.
11. A program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform method steps for remotely controlling a distant equipment, said method comprising the steps of:
- detecting the reception of short range RF signals from at least one distant equipment;
- upon reception of the RF signals, activating a RFID tag to generate information indicative of the at least one distant equipment;
- decoding the information generated by the RFID tag for identifying the at least one distant equipment; and
- activating a remote control process of the at least one distant equipment.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP06301221.5 | 2006-12-07 | ||
EP06301221 | 2006-12-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008068078A1 true WO2008068078A1 (en) | 2008-06-12 |
Family
ID=39092746
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2007/060319 WO2008068078A1 (en) | 2006-12-07 | 2007-09-28 | Remote controller having an rfid tag |
Country Status (2)
Country | Link |
---|---|
US (1) | US8115596B2 (en) |
WO (1) | WO2008068078A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011131962A1 (en) * | 2010-04-19 | 2011-10-27 | Siemens Aktiengesellschaft | Wireless control device |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060253355A1 (en) * | 2005-05-04 | 2006-11-09 | Chicago Board Options Exchange | System and method for creating and trading a digital derivative investment instrument |
US20090223419A1 (en) * | 2008-03-10 | 2009-09-10 | Pavel Korolik | Plate pallet stock detection |
US20110199194A1 (en) * | 2008-08-11 | 2011-08-18 | Nxp B.V. | Programmable device and programming method |
US9148202B2 (en) * | 2009-06-03 | 2015-09-29 | Disney Enterprises, Inc. | RFID-based communication devices and methods for location-based entertainment systems |
US20100320264A1 (en) * | 2009-06-22 | 2010-12-23 | Shay Amsili | Plates container characteristics management system |
US8274610B2 (en) * | 2009-09-29 | 2012-09-25 | Sony Corporation | RFID-based wireless remote control using variable ID field |
US20110074555A1 (en) * | 2009-09-29 | 2011-03-31 | Electronics And Telecommunications Research Institute | Mobile rfid device and data communication method thereof |
CN106033552A (en) * | 2015-03-20 | 2016-10-19 | 中兴通讯股份有限公司 | Passive optoelectronic tag, optoelectronic reader-writer and passive optoelectronic identification system |
US9967395B1 (en) * | 2017-02-23 | 2018-05-08 | T-Mobile Usa, Inc. | IOT-connected devices and equipment automated login system |
US20180341884A1 (en) * | 2017-05-23 | 2018-11-29 | Honeywell International Inc. | Airfield workflow management |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002045441A1 (en) * | 2000-11-28 | 2002-06-06 | Rcd Technology, Inc. | Replacing stored code with user inputting code on the rf id card |
WO2002084991A2 (en) * | 2001-04-13 | 2002-10-24 | Digeo, Inc. | Personalized remote control for an interactive system |
US20040075534A1 (en) * | 2002-10-18 | 2004-04-22 | Pitney Bowes Incorporated | Method for field programming radio frequency identification devices that control remote control devices |
US20040232220A1 (en) * | 2001-07-10 | 2004-11-25 | American Express Travel Related Services Company, Inc. | System for biometric security using a fob |
US20060061482A1 (en) * | 2004-09-23 | 2006-03-23 | Patrick Monney | RFID auto-connect for wireless devices |
Family Cites Families (51)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS60263544A (en) * | 1984-06-11 | 1985-12-27 | Nippon Telegr & Teleph Corp <Ntt> | Cipher system |
CA2053261A1 (en) * | 1989-04-28 | 1990-10-29 | Gary D. Hornbuckle | Method and apparatus for remotely controlling and monitoring the use of computer software |
US5442706A (en) * | 1992-02-27 | 1995-08-15 | Hughes Aircraft Company | Secure mobile storage |
US5341426A (en) * | 1992-12-15 | 1994-08-23 | Motorola, Inc. | Cryptographic key management apparatus and method |
US6744894B1 (en) * | 1994-04-01 | 2004-06-01 | Mitsubishi Corporation | Data management system |
EP0709760B1 (en) * | 1994-10-27 | 2006-05-31 | Intarsia Software LLC | Data copyright management system |
US5513263A (en) * | 1994-11-30 | 1996-04-30 | Motorola, Inc. | Method for establishing classes within a communication network |
JP3747520B2 (en) * | 1996-01-30 | 2006-02-22 | 富士ゼロックス株式会社 | Information processing apparatus and information processing method |
CA2170834C (en) * | 1996-03-01 | 2006-11-21 | Calin A. Sandru | Apparatus and method for enhancing the security of negotiable documents |
GB9706620D0 (en) * | 1997-04-01 | 1997-05-21 | Sgs Thomson Microelectronics | A method for remotely controlling a plurality of apparatus using a single remote control device |
US6615438B1 (en) * | 1997-06-24 | 2003-09-09 | Micro-Heat Inc. | Windshield de-icing |
US6078888A (en) * | 1997-07-16 | 2000-06-20 | Gilbarco Inc. | Cryptography security for remote dispenser transactions |
IL121862A (en) * | 1997-09-29 | 2005-07-25 | Nds Ltd West Drayton | Distributed ird system for pay television systems |
CA2267733A1 (en) * | 1998-04-06 | 1999-10-06 | Smart Technologies, Inc. | Method for editing objects representing writing on an electronic writeboard |
US7286747B1 (en) * | 1998-07-20 | 2007-10-23 | Thomson Licensing | Digital video apparatus user interface |
US7586398B2 (en) * | 1998-07-23 | 2009-09-08 | Universal Electronics, Inc. | System and method for setting up a universal remote control |
US6401201B2 (en) * | 1998-12-31 | 2002-06-04 | Intel Corporation | Arrangements offering firmware support for different input/output (I/O) types |
US6531964B1 (en) * | 1999-02-25 | 2003-03-11 | Motorola, Inc. | Passive remote control system |
CN1383532A (en) * | 2000-06-09 | 2002-12-04 | 精工爱普生株式会社 | Creation of image designation file and reproduction of image using same |
KR100354488B1 (en) * | 2000-06-16 | 2002-10-11 | 주식회사 이플래닛 | Apparatus for and method of preventing illegal reproduction/distribution of digital goods by use of physical goods |
US7526795B2 (en) * | 2001-03-27 | 2009-04-28 | Micron Technology, Inc. | Data security for digital data storage |
US6995652B2 (en) * | 2001-04-11 | 2006-02-07 | Battelle Memorial Institute K1-53 | System and method for controlling remote devices |
US7281132B2 (en) * | 2001-10-19 | 2007-10-09 | Sun Microsystems, Inc. | Using token-based signing to install unsigned binaries |
US20030076968A1 (en) * | 2001-10-23 | 2003-04-24 | Rast Rodger H. | Method and system of controlling automotive equipment remotely |
US7216285B2 (en) * | 2001-11-09 | 2007-05-08 | Marvell International Ltd. | System and method for generating cyclic redundancy check |
EP1320006A1 (en) * | 2001-12-12 | 2003-06-18 | Canal+ Technologies Société Anonyme | Processing data |
US7302059B2 (en) * | 2002-01-02 | 2007-11-27 | Sony Corporation | Star pattern partial encryption |
US7242773B2 (en) * | 2002-09-09 | 2007-07-10 | Sony Corporation | Multiple partial encryption using retuning |
DE60317164T2 (en) * | 2002-01-14 | 2008-08-07 | Ceyx Technologies, Inc., San Diego | METHOD FOR CONFIGURING A LASER OPERATING SYSTEM |
US6720936B1 (en) * | 2002-05-09 | 2004-04-13 | Bbnt Solutions Llc | Adaptive antenna system |
US20030216228A1 (en) * | 2002-05-18 | 2003-11-20 | Rast Rodger H. | Systems and methods of sports training using specific biofeedback |
US8818896B2 (en) * | 2002-09-09 | 2014-08-26 | Sony Corporation | Selective encryption with coverage encryption |
TW200421813A (en) * | 2003-04-03 | 2004-10-16 | Admtek Inc | Encryption/decryption device of WLAN and method thereof |
US7231041B2 (en) * | 2003-08-19 | 2007-06-12 | General Motors Corporation | Method, device, and system for secure motor vehicle remote keyless entry |
US7250695B2 (en) * | 2003-10-31 | 2007-07-31 | Hewlett-Packard Development Company, L.P. | Controlling power supplied to a circuit using an externally applied magnetic field |
US7116229B1 (en) * | 2004-03-31 | 2006-10-03 | Zilog, Inc. | Programming a remote control device using RFID technology |
CN1676374B (en) * | 2004-03-31 | 2011-12-07 | 深圳市朗科科技股份有限公司 | On-board audio-visual system |
US7042342B2 (en) * | 2004-06-09 | 2006-05-09 | Lear Corporation | Remote keyless entry transmitter fob with RF analyzer |
US20080114228A1 (en) * | 2004-08-31 | 2008-05-15 | Mccluskey Joseph | Method Of Manufacturing An Auto-Calibrating Sensor |
WO2006032942A1 (en) * | 2004-09-23 | 2006-03-30 | Nokia Corporation | Method and device for protecting digital content in mobile applications |
TWI263932B (en) * | 2004-10-13 | 2006-10-11 | Chung Hsin Electric & Machiner | Wireless display device |
US20060125968A1 (en) * | 2004-12-10 | 2006-06-15 | Seiko Epson Corporation | Control system, apparatus compatible with the system, and remote controller |
US20060267737A1 (en) * | 2005-05-27 | 2006-11-30 | Colby Steven M | RF Powered Remote Control |
DE102005031611B4 (en) * | 2005-07-06 | 2007-11-22 | Infineon Technologies Ag | Proof of a change in the data of a data record |
US8406421B2 (en) * | 2005-10-13 | 2013-03-26 | Passban, Inc. | Method and system for multi-level secure personal profile management and access control to the enterprise multi-modal communication environment in heterogeneous convergent communication networks |
US7965664B2 (en) * | 2006-05-31 | 2011-06-21 | Honeywell International Inc. | Apparatus and method for integrating wireless field devices with a wired protocol in a process control system |
US7675935B2 (en) * | 2006-05-31 | 2010-03-09 | Honeywell International Inc. | Apparatus and method for integrating wireless or other field devices in a process control system |
US8122447B2 (en) * | 2007-07-31 | 2012-02-21 | Hewlett-Packard Development Company, L.P. | Firmware installation |
US20090094597A1 (en) * | 2007-10-04 | 2009-04-09 | Memory Experts International Inc. | Portable firmware device |
JP5309206B2 (en) * | 2008-04-07 | 2013-10-09 | トムソン ライセンシング | Method for preventing laundering and repackaging of multimedia content in a content distribution system |
US8358781B2 (en) * | 2008-11-30 | 2013-01-22 | Red Hat, Inc. | Nonlinear feedback mode for block ciphers |
-
2007
- 2007-09-28 WO PCT/EP2007/060319 patent/WO2008068078A1/en active Application Filing
- 2007-11-27 US US11/945,399 patent/US8115596B2/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002045441A1 (en) * | 2000-11-28 | 2002-06-06 | Rcd Technology, Inc. | Replacing stored code with user inputting code on the rf id card |
WO2002084991A2 (en) * | 2001-04-13 | 2002-10-24 | Digeo, Inc. | Personalized remote control for an interactive system |
US20040232220A1 (en) * | 2001-07-10 | 2004-11-25 | American Express Travel Related Services Company, Inc. | System for biometric security using a fob |
US20040075534A1 (en) * | 2002-10-18 | 2004-04-22 | Pitney Bowes Incorporated | Method for field programming radio frequency identification devices that control remote control devices |
US20060061482A1 (en) * | 2004-09-23 | 2006-03-23 | Patrick Monney | RFID auto-connect for wireless devices |
Non-Patent Citations (1)
Title |
---|
WEIS S A ET AL: "Security and privacy aspects of low-cost radio frequency identification systems", LECTURE NOTES IN COMPUTER SCIENCE, SPRINGER VERLAG, BERLIN, DE, vol. 2802, 27 January 2004 (2004-01-27), pages 201 - 212, XP002397694, ISSN: 0302-9743 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011131962A1 (en) * | 2010-04-19 | 2011-10-27 | Siemens Aktiengesellschaft | Wireless control device |
Also Published As
Publication number | Publication date |
---|---|
US20080136640A1 (en) | 2008-06-12 |
US8115596B2 (en) | 2012-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8115596B2 (en) | Method and system for controlling distant equipment | |
US11170079B2 (en) | System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone | |
US10341341B2 (en) | RFID authentication architecture and methods for RFID authentication | |
EP2153382B1 (en) | Dynamically programmable rfid transponder | |
EP1755061B1 (en) | Protection of non-promiscuous data in an RFID transponder | |
US7872567B2 (en) | Method for transponder access control | |
US20090033464A1 (en) | Transponder with access protection and method for access to the transponder | |
US20070034691A1 (en) | Using promiscuous and non-promiscuous data to verify card and reader identity | |
JP2011521599A (en) | A system that gives a fixed identification number for a transponder while protecting privacy and preventing tracking | |
EP1840844A2 (en) | Secure radio frequency identification system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07820706 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07820706 Country of ref document: EP Kind code of ref document: A1 |